☆44Feb 14, 2019Updated 7 years ago
Alternatives and similar repositories for Pentest_books
Users that are interested in Pentest_books are comparing it to the libraries listed below
Sorting:
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 3 months ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Go library to help with Nitro Attestation☆16May 30, 2025Updated 9 months ago
- IS2C - CC Cybersecurity Course Notes to help you prepare for the exam☆23Sep 27, 2025Updated 5 months ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆170Feb 22, 2026Updated 2 weeks ago
- ☆11May 19, 2022Updated 3 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- A home internet server configuration for the BeagleBone Black, Raspberry Pi or Cubieboard☆10Jun 16, 2014Updated 11 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- ☆27Sep 5, 2025Updated 6 months ago
- Biteasy Blockchain REST API☆18Mar 28, 2014Updated 11 years ago
- General-purpose implementations of ERC-792 Arbitrables.☆12Jun 21, 2024Updated last year
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- ☆11Nov 14, 2021Updated 4 years ago
- A dependency free native implementation of Ethereum crypto functions missing from WebCrypto.☆16Feb 27, 2026Updated last week
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆11Aug 24, 2023Updated 2 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Abstractions for iterating and mapping over struct fields☆17Jan 15, 2026Updated last month
- ☆11Jan 5, 2022Updated 4 years ago
- Docker image for Apache Derby. This image is no longer mainained.☆10Dec 8, 2023Updated 2 years ago
- DaveLovable The Most Advanced Open-Source AI Web Development Platform Build React applications at lightning speed with AI-powered multi-…☆33Feb 9, 2026Updated last month
- ☆12Dec 26, 2022Updated 3 years ago
- DEPRECATED: Merged with ethcore/parity☆11Jul 18, 2016Updated 9 years ago
- Example Optimized Gas ERC721 Minting Contract☆11Dec 28, 2021Updated 4 years ago
- ☆27Updated this week
- This is NotaMUD, which might be a MUD one day, but currently is not. And it may never be. But it thinks it might be. It runs in Node and…☆11Apr 18, 2023Updated 2 years ago
- Pass Rust strings to C with potentially not needing heap allocation☆13Jan 25, 2026Updated last month
- Hackathon/mock code of MEV rewards distribution☆16May 8, 2021Updated 4 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Dot files and configuration files used on LadOS (Arch Linux)☆11May 4, 2024Updated last year